Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-52733
HistoryMay 21, 2024 - 12:00 a.m.

CVE-2023-52733

2024-05-2100:00:00
ubuntu.com
ubuntu.com
3
linux kernel
s390
decompressor
overflow
vulnerability
zstd
optimization
initrd

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

15.5%

In the Linux kernel, the following vulnerability has been resolved:
s390/decompressor: specify __decompress() buf len to avoid overflow
Historically calls to __decompress() didn’t specify “out_len” parameter on
many architectures including s390, expecting that no writes beyond
uncompressed kernel image are performed. This has changed since commit
2aa14b1ab2c4 (“zstd: import usptream v1.5.2”) which includes zstd library
commit 6a7ede3dfccb (“Reduce size of dctx by reutilizing dst buffer
(#2751)”). Now zstd decompression code might store literal buffer in the
unwritten portion of the destination buffer. Since “out_len” is not set, it
is considered to be unlimited and hence free to use for optimization needs.
On s390 this might corrupt initrd or ipl report which are often placed
right after the decompressor buffer. Luckily the size of uncompressed
kernel image is already known to the decompressor, so to avoid the problem
simply specify it in the “out_len” parameter.

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.9

Confidence

Low

EPSS

0

Percentile

15.5%